It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.

Joe Sturonas

 


 


Joe Sturonas has been developing commercial software for over 25 years, and at PKWARE he drives technology strategy across their entire product portfolio.  As Chief Technology Officer, Joe is responsible for product development, including software engineering, documentation, quality assurance and technical support. He has extensive experience in data security, data center optimization and artificial intelligence.  Mr. Sturonas holds a BS degree from Miami University and an MS degree in Computer Science from DePaul University.


 

Effective data security is closer than many organizations may think. In fact, effectively guarding data may just be a matter of implementing affordable technology and ensuring that it is configured properly. In an interview with GovInfoSecurity, Rebecca Herold, head of Rebecca Herold & Ass...
Every minute of every day presents the opportunity for a data mishap. A security breach, as well as lost, stolen or even compromised records triggers negative exposure that quickly equates to forfeited sales, legal fees, disclosure expenses and a host of remediation costs. The fallout can result in ...
Can you outrun the bear?Because security is not Boolean, how do you know if you are secure? If regulation and compliance are not measures of whether you are secure or not, then how do you measure if your data is secure? Security is very gray, and very complicated. But, consider this simple story for...
There is a common myth that regulation and compliance, such as PCI and Basil II, benefits data security. In other words, thanks to these mandates data is more secure …where it otherwise would not be. In reality, it quite possibly could make some organizations much less secure. How could a regulation...
Projects always need to be completed and delivered under certain constraints. Traditionally, the three constraints have been referred to as the Project Management Triangle. One side of the triangle cannot be changed without affecting the others and each side represents a constraint as follows:● ...